Author:
Faiqurahman Mahar,Syaifuddin S.
Reference16 articles.
1. T. Campbell, R. M., Padayachee, K., & Masombuka, “A survey of honeypot research: Trends and opportunities,” 2015 10th international conference for internet technology and secured transactions (ICITST) IEEE, 208–212 (2015).
2. M. Nawrocki, M. Wählisch, T. C. Schmidt, C. Keil, and J. Schönfelder, “A Survey on Honeypot Software and Data Analysis,” CoRR, abs/1608.06249 (2016).
3. A. Singh, R. J.-S. Processing, U. Communication, and U. 2011, “A honeypot system for efficient capture and analysis of network attack traffic,” 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, IEEE, 514–519 (2011).
4. S. Kumar, P. Singh, … R. S.-I. J. of, and U. 2012, “Distributed honeynet system using gen iii virtual honeynet,” International Journal of Computer Theory and Engineering, 4, (4) (2012).
5. C. Moore and A. Al-Nemrat, “An analysis of honeypot programs and the attack data collected,” International Conference on Global Security, Safety, and Sustainability, 228–238 (2015).